spamidentitytheftcomplianceresilienceProofpointriskassessmentBECEDRconfidentialityOSbotnetDefense-in-depthransomwarewormPHIDDoSVPNcyberattackincidentresponseIOCintegrityincidentdefenseevasionzero-daySecurityOperationspassphraseencryptionphishingadminAPTbusinesscontinuityPIIfirewallSyssecAdminexploitriskmalwarebreachtrainingIPescalationCyberDefenseDarkWebIPSspoofinghackersecuritypolicypasswordbugspywaresmishingWISPHIPAAFTPCyberSecurityMFAnetworkvishingpacketavailabilityIDSIoTsocialengineeringrootkitvirusvulnerabilitycryptographyantivirusinsiderthreatCIAtriadsecurityawarenesspentestspamidentitytheftcomplianceresilienceProofpointriskassessmentBECEDRconfidentialityOSbotnetDefense-in-depthransomwarewormPHIDDoSVPNcyberattackincidentresponseIOCintegrityincidentdefenseevasionzero-daySecurityOperationspassphraseencryptionphishingadminAPTbusinesscontinuityPIIfirewallSyssecAdminexploitriskmalwarebreachtrainingIPescalationCyberDefenseDarkWebIPSspoofinghackersecuritypolicypasswordbugspywaresmishingWISPHIPAAFTPCyberSecurityMFAnetworkvishingpacketavailabilityIDSIoTsocialengineeringrootkitvirusvulnerabilitycryptographyantivirusinsiderthreatCIAtriadsecurityawarenesspentest

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. spam
  2. identity theft
  3. compliance
  4. resilience
  5. Proofpoint
  6. risk assessment
  7. BEC
  8. EDR
  9. confidentiality
  10. OS
  11. botnet
  12. Defense-in-depth
  13. ransomware
  14. worm
  15. PHI
  16. DDoS
  17. VPN
  18. cyber attack
  19. incident response
  20. IOC
  21. integrity
  22. incident
  23. defense evasion
  24. zero-day
  25. Security Operations
  26. passphrase
  27. encryption
  28. phishing
  29. admin
  30. APT
  31. business continuity
  32. PII
  33. firewall
  34. SyssecAdmin
  35. exploit
  36. risk
  37. malware
  38. breach
  39. training
  40. IP
  41. escalation
  42. Cyber Defense
  43. Dark Web
  44. IPS
  45. spoofing
  46. hacker
  47. security policy
  48. password
  49. bug
  50. spyware
  51. smishing
  52. WISP
  53. HIPAA
  54. FTP
  55. Cyber Security
  56. MFA
  57. network
  58. vishing
  59. packet
  60. availability
  61. IDS
  62. IoT
  63. social engineering
  64. rootkit
  65. virus
  66. vulnerability
  67. cryptography
  68. antivirus
  69. insider threat
  70. CIA triad
  71. security awareness
  72. pentest